Secured Data Usage with Controlled Access in Open Network

N. Naveen Kumar, Juluri Sharan Kumar

Abstract


An information merchant has given sensitive information to an arrangement of as far as anyone knows put stock in specialists. Now and again information is spilled and found in unapproved put e.g., on the web or on someone's Laptops, tab, personal PC. For instance, a doctor's facility may give quiet records to specialists who will devise new medications. Correspondingly, an organization may have associations with different organizations that require sharing client information. Another venture may outsource its information preparing, so information may be given to different organizations. The proprietors of the information are called as distributor and the trusted outsiders are called as operators. Information spillage happens each day when private business data, for example, client or patient information, organization insider facts, spending data and so forth, is spilled out. At the point when this data is spilled out, at that point the organizations are at genuine hazard. Most likely information are being spilled from operator's side. Along these lines, organization needs to exceptionally cautious while appropriating such information to specialists. The Goal of Our venture is to examine "how the distributer can assign the private information to the Agents so that the spillage of information would be limited to a Greater Extent by finding a liable specialist". To provide this includes brief idea about data leakage detection and a methodology to detect the data leakage persons.


Full Text:

PDF




Copyright (c) 2017 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org